Lucene search

K
nessusThis script is Copyright (C) 2020-2023 and is owned by Tenable, Inc. or an Affiliate thereof.F5_BIGIP_SOL00854051.NASL
HistoryOct 19, 2020 - 12:00 a.m.

F5 Networks BIG-IP : Linux kernel vulnerability (K00854051)

2020-10-1900:00:00
This script is Copyright (C) 2020-2023 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
38
f5 networks
big-ip
linux kernel
vulnerability
unintended group ownership
escalate privileges
sensitive information
further attacks
k00854051

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.7

Confidence

High

EPSS

0

Percentile

0.4%

The inode_init_owner function in fs/inode.c in the Linux kernel through 4.17.4 allows local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group.
Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID. (CVE-2018-13405)

Impact

Local users are able to create files with an unintended group ownership, allowing attackers to escalate privileges and obtain sensitive information that may aid in further attacks.

#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from F5 Networks BIG-IP Solution K00854051.
#
# The text description of this plugin is (C) F5 Networks.
#

include('compat.inc');

if (description)
{
  script_id(141516);
  script_version("1.7");
  script_set_attribute(attribute:"plugin_modification_date", value:"2023/11/02");

  script_cve_id("CVE-2018-13405");

  script_name(english:"F5 Networks BIG-IP : Linux kernel vulnerability (K00854051)");

  script_set_attribute(attribute:"synopsis", value:
"The remote device is missing a vendor-supplied security patch.");
  script_set_attribute(attribute:"description", value:
"The inode_init_owner function in fs/inode.c in the Linux kernel
through 4.17.4 allows local users to create files with an unintended
group ownership, in a scenario where a directory is SGID to a certain
group and is writable by a user who is not a member of that group.
Here, the non-member can trigger creation of a plain file whose group
ownership is that group. The intended behavior was that the non-member
can trigger creation of a directory (but not a plain file) whose group
ownership is that group. The non-member can escalate privileges by
making the plain file executable and SGID. (CVE-2018-13405)

Impact

Local users are able to create files with an unintended group
ownership, allowing attackers to escalate privileges and obtain
sensitive information that may aid in further attacks.");
  script_set_attribute(attribute:"see_also", value:"https://my.f5.com/manage/s/article/K00854051");
  script_set_attribute(attribute:"solution", value:
"Upgrade to one of the non-vulnerable versions listed in the F5 Solution K00854051.");
  script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2018-13405");

  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2018/07/06");
  script_set_attribute(attribute:"patch_publication_date", value:"2019/05/09");
  script_set_attribute(attribute:"plugin_publication_date", value:"2020/10/19");

  script_set_attribute(attribute:"potential_vulnerability", value:"true");
  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_access_policy_manager");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_advanced_firewall_manager");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_application_acceleration_manager");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_application_security_manager");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_application_visibility_and_reporting");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_domain_name_system");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_global_traffic_manager");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_link_controller");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_local_traffic_manager");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_policy_enforcement_manager");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:f5:big-ip_webaccelerator");
  script_set_attribute(attribute:"cpe", value:"cpe:/h:f5:big-ip");
  script_set_attribute(attribute:"generated_plugin", value:"current");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"F5 Networks Local Security Checks");

  script_copyright(english:"This script is Copyright (C) 2020-2023 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("f5_bigip_detect.nbin");
  script_require_keys("Host/local_checks_enabled", "Host/BIG-IP/hotfix", "Host/BIG-IP/modules", "Host/BIG-IP/version", "Settings/ParanoidReport");

  exit(0);
}


include('f5_func.inc');

if ( ! get_kb_item('Host/local_checks_enabled') ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
var version = get_kb_item('Host/BIG-IP/version');
if ( ! version ) audit(AUDIT_OS_NOT, 'F5 Networks BIG-IP');
if ( isnull(get_kb_item('Host/BIG-IP/hotfix')) ) audit(AUDIT_KB_MISSING, 'Host/BIG-IP/hotfix');
if ( ! get_kb_item('Host/BIG-IP/modules') ) audit(AUDIT_KB_MISSING, 'Host/BIG-IP/modules');

if (report_paranoia < 2) audit(AUDIT_PARANOID);

var sol = 'K00854051';
var vmatrix = {
  'AFM': {
    'affected': [
      '16.0.0','15.1.0','15.0.0-15.0.1','14.0.0-14.1.3','13.0.0-13.1.3','12.1.0-12.1.5','11.5.2-11.6.5'
    ],
    'unaffected': [
      '16.1.0','16.0.1','15.1.1','15.0.1.4','14.1.3.1','13.1.3.5'
    ],
  },
  'AM': {
    'affected': [
      '16.0.0','15.1.0','15.0.0-15.0.1','14.0.0-14.1.3','13.0.0-13.1.3','12.1.0-12.1.5','11.5.2-11.6.5'
    ],
    'unaffected': [
      '16.1.0','16.0.1','15.1.1','15.0.1.4','14.1.3.1','13.1.3.5'
    ],
  },
  'APM': {
    'affected': [
      '16.0.0','15.1.0','15.0.0-15.0.1','14.0.0-14.1.3','13.0.0-13.1.3','12.1.0-12.1.5','11.5.2-11.6.5'
    ],
    'unaffected': [
      '16.1.0','16.0.1','15.1.1','15.0.1.4','14.1.3.1','13.1.3.5'
    ],
  },
  'ASM': {
    'affected': [
      '16.0.0','15.1.0','15.0.0-15.0.1','14.0.0-14.1.3','13.0.0-13.1.3','12.1.0-12.1.5','11.5.2-11.6.5'
    ],
    'unaffected': [
      '16.1.0','16.0.1','15.1.1','15.0.1.4','14.1.3.1','13.1.3.5'
    ],
  },
  'AVR': {
    'affected': [
      '16.0.0','15.1.0','15.0.0-15.0.1','14.0.0-14.1.3','13.0.0-13.1.3','12.1.0-12.1.5','11.5.2-11.6.5'
    ],
    'unaffected': [
      '16.1.0','16.0.1','15.1.1','15.0.1.4','14.1.3.1','13.1.3.5'
    ],
  },
  'DNS': {
    'affected': [
      '16.0.0','15.1.0','15.0.0-15.0.1','14.0.0-14.1.3','13.0.0-13.1.3','12.1.0-12.1.5','11.5.2-11.6.5'
    ],
    'unaffected': [
      '16.1.0','16.0.1','15.1.1','15.0.1.4','14.1.3.1','13.1.3.5'
    ],
  },
  'GTM': {
    'affected': [
      '16.0.0','15.1.0','15.0.0-15.0.1','14.0.0-14.1.3','13.0.0-13.1.3','12.1.0-12.1.5','11.5.2-11.6.5'
    ],
    'unaffected': [
      '16.1.0','16.0.1','15.1.1','15.0.1.4','14.1.3.1','13.1.3.5'
    ],
  },
  'LC': {
    'affected': [
      '16.0.0','15.1.0','15.0.0-15.0.1','14.0.0-14.1.3','13.0.0-13.1.3','12.1.0-12.1.5','11.5.2-11.6.5'
    ],
    'unaffected': [
      '16.1.0','16.0.1','15.1.1','15.0.1.4','14.1.3.1','13.1.3.5'
    ],
  },
  'LTM': {
    'affected': [
      '16.0.0','15.1.0','15.0.0-15.0.1','14.0.0-14.1.3','13.0.0-13.1.3','12.1.0-12.1.5','11.5.2-11.6.5'
    ],
    'unaffected': [
      '16.1.0','16.0.1','15.1.1','15.0.1.4','14.1.3.1','13.1.3.5'
    ],
  },
  'PEM': {
    'affected': [
      '16.0.0','15.1.0','15.0.0-15.0.1','14.0.0-14.1.3','13.0.0-13.1.3','12.1.0-12.1.5','11.5.2-11.6.5'
    ],
    'unaffected': [
      '16.1.0','16.0.1','15.1.1','15.0.1.4','14.1.3.1','13.1.3.5'
    ],
  },
  'WAM': {
    'affected': [
      '16.0.0','15.1.0','15.0.0-15.0.1','14.0.0-14.1.3','13.0.0-13.1.3','12.1.0-12.1.5','11.5.2-11.6.5'
    ],
    'unaffected': [
      '16.1.0','16.0.1','15.1.1','15.0.1.4','14.1.3.1','13.1.3.5'
    ],
  }
};

if (bigip_is_affected(vmatrix:vmatrix, sol:sol))
{
  var extra = NULL;
  if (report_verbosity > 0) extra = bigip_report_get();
  security_report_v4(
      port       : 0,
      severity   : SECURITY_WARNING,
      extra      : extra
  );
}
else
{
  var tested = bigip_get_tested_modules();
  var audit_extra = 'For BIG-IP module(s) ' + tested + ',';
  if (tested) audit(AUDIT_INST_VER_NOT_VULN, audit_extra, version);
  else audit(AUDIT_HOST_NOT, 'running any of the affected modules');
}

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.7

Confidence

High

EPSS

0

Percentile

0.4%